<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Crypto ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/crypto-acl/m-p/895460#M958718</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You do not want to specify port in your crypto acl's. You have a few options. One is to remove "sysopt connection permit-vpn". This means you would have to write all of your vpn access in your interface acl's. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no sysopt connection permit-vpn&lt;/P&gt;&lt;P&gt;access-list 111 extended permit ip host 192.168.178.11 host 10.5.1.2 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp host 192.168.178.11 host 10.5.1.2 eq telnet&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two is to create a vpn-filter and assign it to the group policy for the tunnel group. See this document...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080641a52.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080641a52.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Dec 2007 18:42:08 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-12-13T18:42:08Z</dc:date>
    <item>
      <title>Crypto ACL</title>
      <link>https://community.cisco.com/t5/network-security/crypto-acl/m-p/895459#M958717</link>
      <description>&lt;P&gt;Hi @all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i've a l2l vpn between 2 pixes [7.2(2)]. Now i'm trying to limit the vpn traffic to telnet (biderectional). I've tried it with the acl:&lt;/P&gt;&lt;P&gt;pix1:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 111 line 1 extended permit tcp host 192.168.178.11 range 1024 65535 host 10.5.1.2 eq telnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 111 line 1 extended permit tcp host 10.5.1.2 range 1024 65535 host 192.168.178.11 eq telnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i'm try to connect via telnet form 192.168.178.11 - pix1 - pix2 - 10.5.1.2 the following error occurs on pix2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Received remote Proxy Host data in ID Payload:  Address 192.168.178.11, Protocol 6, Port 27338&lt;/P&gt;&lt;P&gt;Dec 13 18:23:01 [IKEv1 DEBUG]: Group = 10.2.1.1, IP = 10.2.1.1, processing ID payload&lt;/P&gt;&lt;P&gt;Dec 13 18:23:01 [IKEv1 DECODE]: Group = 10.2.1.1, IP = 10.2.1.1, ID_IPV4_ADDR ID received&lt;/P&gt;&lt;P&gt;10.5.1.2&lt;/P&gt;&lt;P&gt;Dec 13 18:23:01 [IKEv1]: Group = 10.2.1.1, IP = 10.2.1.1, Received local Proxy Host data in ID Payload:  Address 10.5.1.2, Protocol 6, Port 23&lt;/P&gt;&lt;P&gt;Dec 13 18:23:01 [IKEv1 DEBUG]: Group = 10.2.1.1, IP = 10.2.1.1, processing notify payload&lt;/P&gt;&lt;P&gt;Dec 13 18:23:01 [IKEv1]: Group = 10.2.1.1, IP = 10.2.1.1, QM IsRekeyed old sa not found by addr&lt;/P&gt;&lt;P&gt;Dec 13 18:23:01 [IKEv1]: Group = 10.2.1.1, IP = 10.2.1.1, Static Crypto Map check, checking map = TELNET, seq = 1...&lt;/P&gt;&lt;P&gt;Dec 13 18:23:01 [IKEv1]: Group = 10.2.1.1, IP = 10.2.1.1, Static Crypto Map check, map = TELNET, seq = 1, ACL does not match proxy IDs src:192.168.178.11 dst:10.5.1.2&lt;/P&gt;&lt;P&gt;Dec 13 18:23:01 [IKEv1]: Group = 10.2.1.1, IP = 10.2.1.1, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 192.168.178.11/255.255.255.255/6/27338 local proxy 10.5.1.2/255.255.255.255/6/23 on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Isn't it possible to restrict the "VPN-Traffic"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i change the acl's to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 111 line 1 extended permit ip host 192.168.178.11 host 10.5.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 111 line 1 extended permit ip host 10.5.1.2 host 192.168.178.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;than the vpn tunnel works without any problems, but, sure, not only allowing telnet traffic to be encrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What didn't i consider?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-acl/m-p/895459#M958717</guid>
      <dc:creator>i.anfrage</dc:creator>
      <dc:date>2019-03-13T00:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Crypto ACL</title>
      <link>https://community.cisco.com/t5/network-security/crypto-acl/m-p/895460#M958718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You do not want to specify port in your crypto acl's. You have a few options. One is to remove "sysopt connection permit-vpn". This means you would have to write all of your vpn access in your interface acl's. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no sysopt connection permit-vpn&lt;/P&gt;&lt;P&gt;access-list 111 extended permit ip host 192.168.178.11 host 10.5.1.2 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp host 192.168.178.11 host 10.5.1.2 eq telnet&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two is to create a vpn-filter and assign it to the group policy for the tunnel group. See this document...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080641a52.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080641a52.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2007 18:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-acl/m-p/895460#M958718</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-12-13T18:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: Crypto ACL</title>
      <link>https://community.cisco.com/t5/network-security/crypto-acl/m-p/895461#M958719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok, that helps. as i'm used to work with checkpoint i thought it would be able to handle it in the corresponding crypto acl. &lt;/P&gt;&lt;P&gt;so many thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 09:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-acl/m-p/895461#M958719</guid>
      <dc:creator>i.anfrage</dc:creator>
      <dc:date>2007-12-14T09:24:46Z</dc:date>
    </item>
  </channel>
</rss>

